Beruflich Dokumente
Kultur Dokumente
As per [1] it is an attack vector that relies heavily on human interaction and often involves
manipulating people into breaking normal security procedures and best practices in order to gain
access to systems, networks or physical locations, or for financial gain. Threat actors use social
engineering techniques to conceal their true identities and motives and present themselves as a
trusted individual or information source. The objective is to influence, manipulate or trick users
into giving up privileged information or access within an organization.
Types of social engineering attacks and popular types of social engineering attacks include[1][3]:
Baiting
Impersonation
Phishing
Spear phishing
Vishing
Pretexting
Scareware
Water-holing
Diversion theft
Quid pro quo
Honey trap
Tailgating
Rogue
Reference
[1] Rouse, Margaret. “What Is Cryptography? - Definition from WhatIs.com.” SearchSecurity, Sept.
2018, Retrieved on 24/01/2019 from www.searchsecurity.techtarget.com/definition/cryptography.
[2] What is Impersonation in Social Engineering? Retrieved on 24/01/2019 from
http://www.mysecurityawareness.com/article.php?article=384&title=what-is-impersonation-in-
social-engineering#.XJcQDShKjIU
[3] Social engineering (security) Retrieved on 24/01/2019 from
https://en.wikipedia.org/wiki/Social_engineering_(security)